Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 11:28
Behavioral task
behavioral1
Sample
de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe
-
Size
208KB
-
MD5
de402bebfa7d174fb366314ad62b4c33
-
SHA1
7a7675d9d5684bd57bbe36d8ffd3b9a44a3c9d2f
-
SHA256
6a80940da722a57b253a1ce69c6ec565e78854820126292f74650b2564af51b0
-
SHA512
bce5df70428485b8409dffdff9f1462e67c42fb2c45a53050cfcbf634066fcafb9a75687ff5570c497d14b13e3f0e0d097d5c3c4b8e73bc8f976b8227940adc0
-
SSDEEP
6144:u3b9XPx3a9IKCC0ef//uXltK8+LVsz9b8:Ya9FeCXuLK8CVsz6
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2348 1428 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1428 de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2348 1428 de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe 30 PID 1428 wrote to memory of 2348 1428 de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe 30 PID 1428 wrote to memory of 2348 1428 de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe 30 PID 1428 wrote to memory of 2348 1428 de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de402bebfa7d174fb366314ad62b4c33_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 1882⤵
- Program crash
PID:2348
-